Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (268 pages) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Machine learning Computer engineering Computer networks Computers - Law and legislation Information technology - Law and legislation Data and Information Security Machine Learning Computer Engineering and Networks Computer Communication Networks Legal Aspects of Computing Medicina legal Xifratge (Informàtica) Seguretat informàtica Programari d'aplicació Cibercultura |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-88381-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism. 4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS. Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References. |
Record Nr. | UNINA-9910502594403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (268 pages) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Machine learning Computer engineering Computer networks Computers - Law and legislation Information technology - Law and legislation Data and Information Security Machine Learning Computer Engineering and Networks Computer Communication Networks Legal Aspects of Computing Medicina legal Xifratge (Informàtica) Seguretat informàtica Programari d'aplicació Cibercultura |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-88381-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism. 4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS. Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References. |
Record Nr. | UNISA-996464525303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Application of Big Data, Blockchain, and Internet of Things for Education Informatization : Second EAI International Conference, BigIoT-EDU 2022, Virtual Event, July 29–31, 2022, Proceedings, Part I / / edited by Mian Ahmad Jan, Fazlullah Khan |
Autore | Jan Mian Ahmad |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (666 pages) |
Disciplina | 005.3 |
Altri autori (Persone) | KhanFazlullah |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Application software
Artificial intelligence Computer networks Computer and Information Systems Applications Artificial Intelligence Computer Communication Networks Programari d'aplicació Processament de dades Intel·ligència artificial Educació |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-031-23950-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A study of College English writing from the perspective of deep learning -- Design and implementation of English teaching analysis system based on Data Mining -- Research on the Design of Modern Music Creation System under Data Technology -- A study on the scoring method of oral English test in College English online computer test -- Design and implementation of key modules of English teaching system based on J2EE -- An analysis of hotel management business strategy research under the background of tourism boom under the correlation algorithm -- An Industrial Software Model Checking Method Based on Machine Learning and Its Application in Education -- Design and implementation of learning management system based on user behavior dynamic recommendation algorithm -- Design and implementation of oral training system based on automatic speech evaluation -- Design and implementation of student physical fitness analysis system based on Data Mining Technology -- An intelligent piano teaching system and method based on a cloud platform -- Analysis and prediction of CET4 based on Data Mining -- Analysis of the rational use of context construction in College English teaching based on Association Rules Mining Algorithm -- Application and Implementation of Education Management System Based on Cloud Storage -- Application of big data in comprehensive management and service of sports training system under the background of informatization -- Application of Big Data Informatization in Public Utilities Response -- Application of classification mining technology based on decision tree in Student Resource Management -- Application of computer intelligent proofreading system in English phrase translation -- Application of data analysis technology in Physical Education Teaching -- Design and implementation of teaching evaluation system in Higher Vocational Colleges Based on association rule algorithm -- Application of data mining algorithm in value engineering in the selection of highway engineering design scheme -- Application of Network Curriculum Platform based on Cloud Computing in Physical Education Teaching -- Application of data mining in psychological education of college students in private independent colleges -- Application of quaternion instructional design mode in higher education based on personalized algorithm -- Application of data mining technology based on Weka in student management -- Application of decision tree algorithm in teaching quality analysis of Physical Education -- Application of environmental isotopes to study the origin and recharge mechanism of geothermal water -- Application of flipped classroom teaching mode based on Ant Colony Algorithm in Higher Vocational java course -- Application of fuzzy c-means clustering algorithm in consumer psychology -- Application of game equilibrium theory and algorithm in modern talent training model -- Application of ID3 algorithm in college students' mental health education -- Application of random simulation algorithm in practical teaching of Public Physical Education in Colleges and Universities -- Application of Intelligent Fuzzy Decision Tree algorithm in English Translation Education -- Application of intelligent water conservancy information system in agricultural water-saving irrigation -- Application of Machine Learning algorithm in Marketing Education -- Design and implementation of dynamic grouping algorithm based on sports track -- Application of montage thinking in computer sketch painting -- Application of network course platform based on cloud computing in Physical Education -- Design and development of CAI Courseware for basketball teaching of Physical Education Specialty -- Deep Learning in the Context of Big Data: The Theoretical Basis of Undergraduate Education Reform -- Decision support system model of education management based on cloud storage technology -- Data mining analysis based on business administration data -- Application of stochastic simulation algorithm in evaluation of PE training -- Course recommendation method and system of education platform based on deep learning -- Design and research of College Students' comprehensive quality evaluation system based on evolutionary algorithm -- Design of business administration professional shared whiteboard teaching system based on BS data mining architecture -- Design of Education Management System Based on Cloud Storage -- Design of information teaching management system integrating Association Rule Mining Algorithm -- On the influence of computer digital animation technology on film style -- Discourse analysis of Chinese culture translation based on crawler algorithm -- Optimization models and educational teaching research in Agricultural Logistics System -- Practical Research on the Form of Art Undergraduate Education in Cultural and Creative Industry under the Background of Big Data -- Prediction of English major training model in Higher Vocational Education Based on fuzzy neural network algorithm -- Professional course system of film and television photography and production under data technology -- Quality evaluation model of preschool art education based on deep learning theory -- Education targeted poverty alleviation system under cloud computing -- Research and construction of university sports decision support system based on extraction algorithm and big data analysis technology -- Research and design of education management system based on cloud storage -- Research and Design of Information Teaching Management System integrating association rule mining algorithm -- Research Design of English Teaching Resource Management System Based on Collaborative Recommendation -- Research on art design education based on genetic algorithm -- Research on channel optimization strategy based on Data Mining Technology.-Research on College Chinese online learning system based on content recommendation algorithm -- Research on College Students' English Online Autonomous Learning Based on ID3 algorithm -- Research on computer aided English curriculum design in Higher Vocational Colleges -- Research on computer network information security protection strategy and evaluation algorithm education -- Research on Computer Software Teaching Method of Digital Media Art Theory under the Background of Big Data -- Research on Design of English teaching resource management system based on Collaborative Recommendation. |
Record Nr. | UNINA-9910644266403321 |
Jan Mian Ahmad | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Artificial Neural Networks and Machine Learning – ICANN 2022 : 31st International Conference on Artificial Neural Networks, Bristol, UK, September 6–9, 2022, Proceedings, Part I / / edited by Elias Pimenidis, Plamen Angelov, Chrisina Jayne, Antonios Papaleonidas, Mehmet Aydin |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (783 pages) |
Disciplina | 006.3 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Artificial intelligence
Application software Computers Computer engineering Computer networks Artificial Intelligence Computer and Information Systems Applications Computing Milieux Computer Engineering and Networks Intel·ligència artificial Xarxes d'ordinadors Programari d'aplicació Aprenentatge automàtic |
Soggetto genere / forma |
Llibres electrònics
Congressos |
ISBN |
9783031159190
3031159195 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Deep Learning -- , Neural Network Theory -- Relational Learning, Reinforcement Learning -- Natural language processing, Generative Models -- Graphical Models, Recommender Systems -- Image Processing, Recurrent Networks -- Evolutionary Neural Networks -- Unsupervised Neural Networks -- Neural Network Models. |
Record Nr. | UNINA-9910592979303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops : DECSoS, DepDevOps, SASSUR, SENSEI, USDAI, and WAISE Munich, Germany, September 6–9, 2022, Proceedings / / edited by Mario Trapp, Erwin Schoitsch, Jérémie Guiochet, Friedemann Bitsch |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (360 pages) |
Disciplina | 005.3 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer engineering
Computer networks Image processing—Digital techniques Computer vision Application software Software engineering Computer science Data protection Computer Engineering and Networks Computer Imaging, Vision, Pattern Recognition and Graphics Computer and Information Systems Applications Software Engineering Theory of Computation Security Services Seguretat informàtica Organització d'ordinadors Enginyeria de programari Llenguatges de programació Lògica informàtica Programari d'aplicació |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN |
9783031148620
3031148622 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Dependable Smart Embedded Cyber-Physical Systems and Systems-of-Systems -- Dependable Development-Operation Continuum Methods for Dependable Cyber-Physical System -- Next Generation of System Assurance Approaches for Critical Systems -- Security and Safety Interaction -- Underpinnings for Safe Distributed Artificial Intelligence -- Artificial Intelligence Safety Engineering. |
Record Nr. | UNINA-9910592980603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer vision and machine learning in agriculture / / Mohammad Shorif Uddin and Jagdish Chand Bansal, Editors |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (180 pages) : illustrations |
Disciplina | 630.2085 |
Collana | Algorithms for Intelligent Systems |
Soggetto topico |
Computational intelligence
Robotics Machine learning Visió per ordinador Aprenentatge automàtic Programari d'aplicació Agricultura |
Soggetto genere / forma | Llibres electrònics |
ISBN | 981-336-424-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484429803321 |
Gateway East, Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital Multimedia Communications : 20th International Forum on Digital TV and Wireless Multimedia Communications, IFTC 2023, Beijing, China, December 21–22, 2023, Revised Selected Papers, Part II / / edited by Guangtao Zhai, Jun Zhou, Long Ye, Hua Yang, Ping An, Xiaokang Yang |
Autore | Zhai Guangtao |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (413 pages) |
Disciplina | 006.7 |
Altri autori (Persone) |
ZhouJun
YeLong YangHua AnPing YangXiaokang |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Multimedia systems
Application software Artificial intelligence Image processing - Digital techniques Computer vision Multimedia Information Systems Computer and Information Systems Applications Artificial Intelligence Computer Imaging, Vision, Pattern Recognition and Graphics Sistemes multimèdia Programari d'aplicació Intel·ligència artificial Processament d'imatges |
Soggetto genere / forma | Llibres electrònics |
ISBN | 981-9736-26-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | -- Quality Assessment. -- AUIQE: Attention-Based Underwater Image Quality Evaluator. -- I2QED: A Benchmark Database for Infrared Imaging Quality Evaluation. -- Perceptual Blind Panoramic Image Quality Assessment Based on Super-Pixel. -- Image Aesthetics Assessment Based on Visual Perception and Textual Semantic Understanding. -- An Omnidirectional Videos Quality Assessment Method Using Salient Object Information. -- A No-Reference Stereoscopic Image Quality Assessment Based on Cartoon Texture Decomposition and Human Visual System. -- Decoding the Flow Experience in Video Games: An Analysis of Physiological and Performance Metrics. -- Source Coding. -- ULIC: Ultra Lightweight Image Coder on Wearable Devices. -- Temporal Dependency-Oriented Deep In-Loop Filter for VVC. -- Resolution-Agnostic Neural Compression for High-Fidelity Portrait Video Conferencing via Implicit Radiance Fields. -- Fast QTMT Decision for H.266/VVC via Jointly Leveraging Neural Network and Machine Learning Models. -- End-to-End Image Compression Through Machine Semantics. -- Application of AI. -- PM2.5 Concentration Measurement Based on Natural Scene Statistics and Progressive Learning. -- Human-Centered Financial Signal Processing: A Case Study on Stock Chart Analysis. -- Unsupervised Event-to-Image Reconstruction Based on Domain Adaptation. -- Adjusting Exploitation and Exploration Rates of Differential Evolution: A Novel Mutation Strategy. -- Revealing Real Face for Generalized Anti-Spoofing. -- Study on Sound Insulation Performance of Membrane-Type Acoustic Metamaterials with Pendulum Arm. -- An Anomaly Detection Framework for Propagation Networks Leveraging Deep Learning. -- MABC-Net: Multimodal Mixed Attentional Network with Balanced Class for Temporal Forgery Localization. -- Exploiting Diffusion Model as Prompt Generator for Object Localization. -- Depression Recognition Based on Pre-Trained ResNet-18 Model and Brain Effective Connectivity Network. -- ChatASD: LLM-Based AI Therapist for ASD. -- Billiards Hitting Assistance System. -- Visual Detection System for Industrial Defects. -- A Multimodal Registration and Fusion Diagnostic System Based on Multi-Scale Feature. -- CCDaS: A Benchmark Dataset for Cartoon Character Detection in Application Scenarios. -- Driving Dynamics: An In-depth Analysis of Attention Allocation Between Driver and Co-Driver in a Simulated Environment. |
Record Nr. | UNINA-9910866587303321 |
Zhai Guangtao | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Domain-Specific Conceptual Modeling : Concepts, Methods and ADOxx Tools / / edited by Dimitris Karagiannis, Moonkun Lee, Knut Hinkelmann, Wilfrid Utz |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (643 pages) |
Disciplina |
003.54
005.743 |
Soggetto topico |
Application software
Software engineering Business information services Computer and Information Systems Applications Software Engineering Enterprise Architecture Business Information Systems Simulació per ordinador Models matemàtics Programari d'aplicació |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-030-93547-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I: Background -- 1. Conceptual Modelling Methods: The AMME Agile Engineering Approach -- 2. Development of Conceptual Models and Realization of Modelling Tools Within the ADOxx Meta-Modelling Environment: A Living Paper -- 3. Challenging Digital Innovation Through the OMiLAB Community of Practice -- Part II: Previous Volume: Synopsis -- 4. The Purpose-Specificity Framework for Domain-Specific Conceptual Modeling -- Part III: Enterprise Management -- 5. Enterprise Modeling with 4EM: Perspectives and Method -- 6. PGA 2.0: A Modeling Technique for the Alignment of the Organizational Strategy and Processes -- 7. The LiteStrat Modelling Method: Towards the Alignment of Strategy and Code -- 8. itsVALUE: Modelling and Analysing Value Streams for IT Services -- Part IV: Enterprise Information Systems -- 9. Enterprise Construction Modeling Method -- 10. Tool Support for Fractal Enterprise Modeling -- 11. The Integration of Risk Aspects into Business Process Management: The e-BPRIM Modeling Method -- 12. Modeling the Phenomenon of Capability Change: The KYKLOS Method -- 13. A Security Assessment Platform for Stochastic Petri Net (SPN) Modelling in the Internet of Things (IoT) Ecosystem -- Part V: Business Ecosystems and Services -- 14. A Modeling Tool for Exploring Business Ecosystems in a (Pre-)conceptual Phase -- 15. A Capability-Based Method for Modeling Resilient Data Ecosystems -- 16. Space of Services Method (SoS) -- 17. Design and Engineering of Product-Service Systems (PSS): The SEEM Methodology and Modeling Toolkit -- Part VI: Knowledge Engineering -- 18. Model-Based Guide Toward Digitization in Digital Business Ecosystems -- 19. Generating ROS Codes from User-Level Workflow in PRINTEPS -- 20. ECAVI: An Assistant for Reasoning About Actions and Change with the Event Calculus -- Part VII: Technology Enhanced Education -- 21. Tree Diagrams and Unit Squares 4.0: Digitizing Stochastic Classes with the Didactic Modeling Tool PROVIS -- 22. Improving Student Mobility Through Automated Mapping of Similar Courses -- Part VIII: Digital Humanities -- 23. Aggregation and Curation of Historical Archive Information -- Part IX: Modelling Method Conceptualization -- 24. Conceptualization of Modelling Methods in the Context of Categorical Mechanisms -- 25. Conceptualizing Design Thinking Artefacts: The Scene2Model Storyboard Approach -- 26. An Approach to the Information System Conceptual Modeling Based on the Form Types -- Part X: Conceptual Modelling Language Extension -- 27. BPMN4MoPla: Mobility Planning Based on Business Decision-Making -- 28. BPMN Extension for Multi-Protocol Data Orchestration. |
Record Nr. | UNINA-9910552715903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Excel 2019 for physical sciences statistics : a guide to solving practical problems / / Thomas J. Quirk, Meghan H. Quirk, Howard F. Horton |
Autore | Quirk Thomas J. |
Edizione | [2nd ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XIX, 242 p. 166 illus., 161 illus. in color.) |
Disciplina | 519.5 |
Collana | Excel for Statistics |
Soggetto topico |
Statistics
Mathematical physics Application software Estadística Física matemàtica Programari d'aplicació |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-030-63238-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface -- Acknowledgements -- 1 Sample Size, Mean, Standard Deviation, and Standard Error of the Mean -- 2 Random Number Generator -- 3 Confidence Interval About the Mean Using the TINV Function and Hypothesis Testing -- 4 One-Group t-Test for the Mean -- 5 Two-Group t-Test of the Difference of the Means for Independent Groups -- 6 Correlation and Simple Linear Regression -- 7 Multiple Correlation and Multiple Regression -- 8 One-Way Analysis of Variance (ANOVA) -- Appendix A: Answers to End-of-Chapter Practice Problems -- Appendix B: Practice Test -- Appendix C: Answers to Practice Test -- Appendix D: Statistical Formulas -- Appendix E: t-table -- Index. |
Record Nr. | UNISA-996466556103316 |
Quirk Thomas J. | ||
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Excel 2019 for physical sciences statistics : a guide to solving practical problems / / Thomas J. Quirk, Meghan H. Quirk, Howard F. Horton |
Autore | Quirk Thomas J. |
Edizione | [2nd ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XIX, 242 p. 166 illus., 161 illus. in color.) |
Disciplina | 519.5 |
Collana | Excel for Statistics |
Soggetto topico |
Statistics
Mathematical physics Application software Estadística Física matemàtica Programari d'aplicació |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-030-63238-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface -- Acknowledgements -- 1 Sample Size, Mean, Standard Deviation, and Standard Error of the Mean -- 2 Random Number Generator -- 3 Confidence Interval About the Mean Using the TINV Function and Hypothesis Testing -- 4 One-Group t-Test for the Mean -- 5 Two-Group t-Test of the Difference of the Means for Independent Groups -- 6 Correlation and Simple Linear Regression -- 7 Multiple Correlation and Multiple Regression -- 8 One-Way Analysis of Variance (ANOVA) -- Appendix A: Answers to End-of-Chapter Practice Problems -- Appendix B: Practice Test -- Appendix C: Answers to Practice Test -- Appendix D: Statistical Formulas -- Appendix E: t-table -- Index. |
Record Nr. | UNINA-9910484355603321 |
Quirk Thomas J. | ||
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|